1. Blum D. Identity interoperability, standards, and the state of adoption. Presentation for the ID Trust (04 March 2008) at: http://middleware.internet2.edu/idtrust/2008/slides/01-blum-standards.ppt.
2. Carr NG. The end of corporate computing. MIT Sloan Management Review, Spring; 2005, pp. 67–73.
3. Carr NG. The big switch: Rewiring the world, from Edison to Google. W.W. Norton & Co.; 2008 at: www.nicholasgcarr.com/bigswitch/.
4. Cavoukian A. Identity theft revisited: Security is not enough. (Sept 2005) at: www.ipc.on.ca/images/Resources/idtheft-revisit.pdf.
5. Cavoukian A. 7 laws of identity: The case for privacy-embedded laws of identity in the digital age. (October 2006) at: www.ipc.on.ca/images/Resources/up-7laws_whitepaper.pdf.